Proposal / Submission Type
Peer Reviewed Paper
Location
Daytona Beach, Florida
Start Date
21-5-2015 8:30 AM
Abstract
Malicious insiders account for large proportion of security breaches or other kinds of loss for organizations and have drawn attention of both academics and practitioners. Although methods and mechanism have been developed to monitor potential insider via electronic data monitoring, few studies focus on predicting potential malicious insiders. Based on the theory of planned behavior, certain cues should be observed or expressed when an individual performs as a malicious insider. Using text mining to analyze various media content of existing insider cases, we strive to develop a method to identify crucial and common indicators that an individual might be a malicious insider.
Keywords: malicious insider, insider threat, the theory of planned behavior, text mining
Scholarly Commons Citation
Liang, Nan and Biros, David, "Identifying Common Characteristics of Malicious Insiders" (2015). Annual ADFSL Conference on Digital Forensics, Security and Law. 8.
https://commons.erau.edu/adfsl/2015/thursday/8
Included in
Aviation Safety and Security Commons, Computer Law Commons, Defense and Security Studies Commons, Forensic Science and Technology Commons, Information Security Commons, National Security Law Commons, OS and Networks Commons, Other Computer Sciences Commons, Social Control, Law, Crime, and Deviance Commons
Identifying Common Characteristics of Malicious Insiders
Daytona Beach, Florida
Malicious insiders account for large proportion of security breaches or other kinds of loss for organizations and have drawn attention of both academics and practitioners. Although methods and mechanism have been developed to monitor potential insider via electronic data monitoring, few studies focus on predicting potential malicious insiders. Based on the theory of planned behavior, certain cues should be observed or expressed when an individual performs as a malicious insider. Using text mining to analyze various media content of existing insider cases, we strive to develop a method to identify crucial and common indicators that an individual might be a malicious insider.
Keywords: malicious insider, insider threat, the theory of planned behavior, text mining
Comments
Session Chair: Ezhil S. Kalaimannan, University of West Florida